|
A Sybex guide to Windows Security concepts, perfect for IT beginners Security is one of the most important components to every company’s computer network. That’s why the Security Fundamentals MTA Certification is so highly sought after. Filling IT positions is a top...
Editeur :
Sybex
Parution :
2019-10-24
PDF, ePub
|
The investigator’s practical guide for cybercrime evidence identification and collection Cyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. Many attacks are discovered only after the data has been...
Editeur :
Wiley
Parution :
2019-09-13
PDF, ePub
|
Almost all technical systems currently either interface with or are themselves largely software systems. Software systems must not harm their environment, but are also often vulnerable to security attacks with potentially serious economic, political, and physical...
Editeur :
SAGE Publications Ltd
Parution :
2019-08-15
PDF
|
The must-have test prep for the new CompTIA PenTest+ certification CompTIA PenTest+ is an intermediate-level cybersecurity certification that assesses second-generation penetration testing, vulnerability assessment, and vulnerability-management skills. These cognitive...
Editeur :
Sybex
Parution :
2019-06-03
PDF, ePub
|
Comprehensive coverage of the new CASP+ exam, with hands-on practice and interactive study tools The CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-003, Third Edition, offers invaluable preparation for exam CAS-003. Covering 100 percent of the exam...
Editeur :
Sybex
Parution :
2019-01-23
PDF, ePub
|
Industry and government are increasingly reliant on an intelligent – or ‘smart’ – and interconnected computer infrastructure, but the reality is that it is extremely difficult to provide full cyber defense and/or intrusion prevention for the smart networks that connect...
Editeur :
SAGE Publications Ltd
Parution :
2018-09-15
PDF
|
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications.An effective defense consists...
Editeur :
Sybex
Parution :
2018-08-31
PDF, ePub
|
Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the...
Editeur :
Wiley
Parution :
2018-03-13
PDF, ePub
|
With the increased dependence on digital and internet technologies, cyber security has come to be regarded as a national security issue, and the number of countries with a published cyber security strategy continues to rise. But these national cyber security strategies...
Editeur :
SAGE Publications Ltd
Parution :
2017-07-15
PDF
|
Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not...
Editeur :
Wiley
Parution :
2017-02-27
PDF, ePub
|
The sheer quantity of widely diverse data which now results from multiple sources presents a problem for decision-makers and analysts, who are finding it impossible to cope with the ever-increasing flow of material. This has potentially serious consequences for the...
Editeur :
SAGE Publications Ltd
Parution :
2016-11-15
PDF
|
Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what...
Editeur :
Wiley
Parution :
2016-08-19
PDF, ePub
|
Dr Mary Aiken is the world's leading expert in forensic cyberpsychology - a discipline that combines psychology, criminology and technology to investigate the intersection between technology and human behaviour. In this, her first book, Aiken has created a starting...
Editeur :
John Murray
Parution :
2016-08-18
ePub
|
Nowadays approximately 6 billion people use a mobile phone and they now take a central position within our daily lives. The 1990s saw a tremendous increase in the use of wireless systems and the democratization of this means of communication. To allow the communication...
Editeur :
Wiley-ISTE
Parution :
2016-03-03
PDF, ePub
|
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future...
Editeur :
Wiley
Parution :
2015-08-27
PDF, ePub
|
Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee security Fully updated to reflect...
Editeur :
Wiley
Parution :
2015-07-10
PDF, ePub
|
|
Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable...
Editeur :
Wiley
Parution :
2015-04-16
PDF, ePub
|
An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing...
Editeur :
Wiley
Parution :
2015-03-18
PDF, ePub
|
See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book...
Editeur :
Wiley
Parution :
2015-02-17
PDF, ePub
|